SYSTEM AND METHOD FOR ELECTRONIC CERTIFICATION AND AUTHENTICATION OF DATA
First Claim
1. A method for authenticating data, the method comprising:
- receiving data individually encrypted in a first encryption layer by each of a plurality of users using user-specific private keys;
encrypting the received data together in a second encryption layer to create multi-layered encrypted data; and
transferring the multi-layered encrypted data to a device that has public keys that only decrypt data encrypted by private keys assigned to a plurality of pre-designated authorizers to determine if the users are the pre-designated authorizers.
3 Assignments
0 Petitions
Accused Products
Abstract
A system and method for authenticating data. Data may be received that is individually encrypted in a first encryption layer by each of a plurality of users using user-specific private keys. The received data may be encrypted together in a second encryption layer to create multi-layered encrypted data. The multi-layered encrypted data may be transferred to a beneficiary device to determine if the encrypted data is authentic. At the beneficiary device, the second encryption layer may be decrypted to expose the first encryption layer. Then, the first encryption layer may be decrypted using public keys that only decrypt data encrypted by private keys assigned to a plurality of authorizers pre-designated to authenticate the data. If the first encryption layer is properly decrypted using the authorizers'"'"' decryption keys, it may be determined that the users are the pre-designated authorizers.
-
Citations
20 Claims
-
1. A method for authenticating data, the method comprising:
-
receiving data individually encrypted in a first encryption layer by each of a plurality of users using user-specific private keys; encrypting the received data together in a second encryption layer to create multi-layered encrypted data; and transferring the multi-layered encrypted data to a device that has public keys that only decrypt data encrypted by private keys assigned to a plurality of pre-designated authorizers to determine if the users are the pre-designated authorizers. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method for authenticating original data, the method comprising:
-
receiving multi-layered encrypted data, wherein a first encryption layer is individually encrypted by a plurality of users using user-specific private keys, which is in turn combined and encrypted in a second encryption layer; decrypting the second encryption layer to expose the first encryption layer; attempting to decrypt the first encryption layer using public keys that only decrypt data encrypted by private keys assigned to a plurality of authorizers pre-designated to authenticate the data; and determining that the users are the pre-designated authorizers only if the first encryption layer is properly decrypted using the authorizers'"'"' decryption keys. - View Dependent Claims (11, 12, 13, 14)
-
-
15. A system for authenticating data, the systems comprising:
-
a memory to store multi-layered encrypted data, wherein a first encryption layer is individually encrypted by a plurality of users using user-specific private keys, which is in turn combined and encrypted in a second encryption layer; and a processor to transfer the multi-layered encrypted data to a beneficiary device, wherein the beneficiary device is adapted to; decrypt the second encryption layer to expose the first encryption layer, attempt to decrypt the first encryption layer using public keys that only decrypt data encrypted by private keys assigned to a plurality of authorizers pre-designated to authenticate the data, and determine that the users are the pre-designated authorizers only if the first encryption layer is properly decrypted using the authorizers'"'"' decryption keys. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification